Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Damn, didn’t know that. Thanks, I’ll update.

Edit: Done, seeing changes will need an F5.



Note that some DNS providers hack around the issue (like CloudFlate by pretending your CNAME was in-fact an A record http://blog.cloudflare.com/introducing-cname-flattening-rfc-...), but if you're self-hosting DNS or your DNS provider doesn't do any special handling, then you can't have a root CNAME


You could also suggest using a free service like:

http://wwwizer.com/naked-domain-redirect

It'll 302 redirect naked domains to www.domain, which will resolve to whatever you've configured it for.

This should let you chain A -> 302 redirect -> CNAME and bypass the GitHub DDoS protection.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: